search
Join or Log In

Offensive Security Tools

Offensive Security tools and solutions.

68 products available

RedForce Logo

RedForce

EG flag
verified⭐ Editor's Choice

Application Security

4.3
2 reviews

RedForce is an information security consultancy specializing in offensive security. The firm offers services such as red team operations, infrastructure and web application penetration.

AMSAT Logo

AMSAT

United Arab Emirates flag
⭐ Editor's Choice

Application Security

3.8
1 review

AMSAT is a premier managed cybersecurity provider with operations in the United States, United Arab Emirates, and the United Kingdom. The company offers a range of security services including infrastr

Cyber 50 Defense Logo

Cyber 50 Defense

United Arab Emirates flag

GRC

4.8
3 reviews

Cyber 50 Defense is an UAE-based cybersecurity company offering governance, risk and compliance (GRC) solutions, 24/7 managed protection, security assessments, incident response, and compliance servic

CBRX AI Red Teaming Logo

CBRX AI Red

language

Offensive Security

4.7
2 reviews

CBRX AI Red Teaming on SecurityListing: Offensive security testing service for LLM applications and AI systems

Cobalt Strike HTTP C2 Redirectors with Apache mod_rewrite Logo

Cobalt Strike HTTP

language

Offensive Security

4.7
2 reviews

Cobalt Strike HTTP C2 Redirectors with Apache mod_rewrite on SecurityListing: Using Apache mod_rewrite as a redirector to filter C2 traffic for Cobalt Strike servers.

Brute Ratel C4 Logo

Brute Ratel C4

language

Offensive Security

4.7
2 reviews

Brute Ratel C4 on SecurityListing: Advanced command and control tool for red teaming and adversary simulation with extensive features and evasion capabilities.

xargs Logo

xargs

language

Offensive Security

4.7
2 reviews

xargs on SecurityListing: A command that builds and executes command lines from standard input, allowing for the execution of commands with multiple arguments.

DorkSearch Logo

DorkSearch

language

Offensive Security

4.7
2 reviews

DorkSearch on SecurityListing: An AI-powered Google Dorking tool that helps create effective search queries to uncover sensitive information on the internet.

eShield IT Services Logo

eShield IT Services

United Arab Emirates flag

Cloud Security

4.5
3 reviews

eShield IT Services is a cybersecurity company based in the United Arab Emirates that provides security, privacy, and regulatory compliance services. It specializes in data protection law, PCI DSS and

Combatting Incident Responders with Apache mod_rewrite Logo

Combatting Incident Responders

language

Offensive Security

4.5
3 reviews

Combatting Incident Responders with Apache mod_rewrite on SecurityListing: Using Apache mod_rewrite rules to rewrite incident responder or security appliance requests to an innocuous website or the target's real website.

SSD TECH Logo

SSD TECH

United Arab Emirates flag

AI Security

4.5
3 reviews

SSD TECH is a cybersecurity firm specializing in risk assessment, security architecture, audits, compliance, and governance across enterprises. The company emphasizes reducing risk for organizations b

ParrotSec Logo

ParrotSec

language

Offensive Security

4.5
3 reviews

ParrotSec on SecurityListing: Parrot Security OS is a comprehensive, secure, and customizable operating system for cybersecurity professionals, offering over 600+ tools and utilities for red and blue team operations.

Lab of a Penetration Tester: Week of Evading Microsoft ATA Logo

Lab of a

language

Offensive Security

4.5
3 reviews

Lab of a Penetration Tester: Week of Evading Microsoft ATA on SecurityListing: A week-long series of articles and talks on evading Microsoft Advanced Threat Analytics (ATA) detection

How to Write Malleable C2 Profiles for Cobalt Strike Logo

How to Write

language

Offensive Security

4.5
1 review

How to Write Malleable C2 Profiles for Cobalt Strike on SecurityListing: Learn how to create new Malleable C2 profiles for Cobalt Strike to avoid detection and signatured toolset

DVWA - Brute Force (High Level) - Anti-CSRF Tokens Logo

DVWA - Brute

language

Offensive Security

4.5
1 review

DVWA - Brute Force (High Level) - Anti-CSRF Tokens on SecurityListing: A guide to brute forcing DVWA on the high security level with anti-CSRF tokens

Aircrack-ng Logo

Aircrack-ng

language

Offensive Security

4.5
1 review

Aircrack-ng on SecurityListing: A complete suite of tools for assessing WiFi network security with capabilities for monitoring, attacking, testing, and cracking.

CYGEN Logo

CYGEN

EG flag

Cloud Security

4.5
1 review

CYGEN is a cybersecurity company offering data-driven, customized security solutions to protect digital assets and ensure business continuity. With five years in operation, they serve clients across E

Cylert-me Logo

Cylert-me

EG flag

GRC

4.5
1 review

Cylert-me provides cybersecurity and information security consultations to organizations of all sizes across the Middle East, offering services such as penetration testing, security operations centers

Rewterz Logo

Rewterz

United Arab Emirates flag

Application Security

4.5
1 review

Rewterz is a cybersecurity company that provides advanced defense and threat protection services to organizations worldwide. The company offers capabilities including XDR, threat intelligence, managed

Black Cell Logo

Black Cell

United Arab Emirates flag

Cloud Security

4.5
1 review

Black Cell is a cybersecurity firm focused on protecting critical infrastructures in the Middle East, offering offensive security, cloud security, compliance, and integrated security services. The com

Abusing DCOM For Yet Another Lateral Movement Technique Logo

Abusing DCOM For

language

Offensive Security

4.5
1 review

Abusing DCOM For Yet Another Lateral Movement Technique on SecurityListing: An exploration of a new method to abuse DCOM for remote payload execution and lateral movement.

Covert Red Team Attack Infrastructure Logo

Covert Red Team

language

Offensive Security

4.5
1 review

Covert Red Team Attack Infrastructure on SecurityListing: Back-end component for red team operations with crucial design considerations.

DNS Tunnelling Logo

DNS Tunnelling

language

Offensive Security

4.5
1 review

DNS Tunnelling on SecurityListing: A technique to encode data within DNS queries for covert communication channels.

Ophcrack Logo

Ophcrack

language

Offensive Security

4.5
1 review

Ophcrack on SecurityListing: Ophcrack is a free Windows password cracker based on rainbow tables with various features for password recovery.